avatar
Sean M. Collins

Passyunk Square native

avatar
Sean M. Collins
sc68cal@jawns.club

@xgerman "the treats must flow"

May 07, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@bagder hoo boy.

May 02, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

I'm proud of myself for using recursion at work to traverse half a gig of JSON data

May 02, 2025
avatar
Sean M. Collins
sc68cal@jawns.club
Politics

"Gerry Connolly asked 70 year old Rep. Stephen Lynch to take up his Oversight responsibilities until the next election. Lynch’s background is…colorful"

bsky.app/profile/kenklippenste

April 29, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@bagder being the target of someone else's AI slop "business" must be so infuriating.

April 29, 2025
avatar
Sean M. Collins
sc68cal@jawns.club
Politics

Too busy dying to do any actual oversight.

April 29, 2025
avatar
Sean M. Collins
sc68cal@jawns.club
Politics

Gerry Connolly pushed AOC out of the way to take a position on the Oversight Committee, insisting it was "his turn", only made it 4 months.

The Democrats are not a serious political party.

April 29, 2025
avatar
Sean M. Collins
sc68cal@jawns.club
Politics

Gruesome Gavin Newsome says that deporting people without due process is a "distraction" from real issues.

Fuck the Democrats

April 26, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@atthenius Columbia capitulated to the Trump administration and look what they get

April 25, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@xgerman my bonds!

April 24, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@skyfaller wow..I have a Pixel 7 and the camera is .... just meh. Guess that Pro really means something

April 24, 2025
avatar
Sean M. Collins
sc68cal@jawns.club

@skyfaller what camera lense do you have, if you're using an SLR? I'm in the market for a zoom lense for my d40

April 23, 2025
sc68cal shared a status by SecureOwl
avatar
Mike Sheward
SecureOwl@infosec.exchange

I did some reversing/exploring on a widely used IoT product for fun this week, and here’s what I found:

- embedded Linux on an SD card
- SD card not encrypted
- developed by a third party on behalf of the end customer who makes the actual device this thing is connected too
- runs the code in docker containers from a private container repo
- docker credentials for private repo stored locally
- can use docker credentials to access containers for all of third parties customers, not just the one who makes the device
- GitHub creds in bash history
- can access source code for all customer projects using said creds

So things are going well over there.

April 19, 2025
sc68cal shared a status by josephcox
avatar
Joseph Cox
josephcox@infosec.exchange

New from 404 Media: ICE is planning a central database of health, labor, and housing agency data to find targets for deportation. The tool, called ATrac or Alien Tracker, already has data from Social Security Administration. Is used to send targets to teams in field

404media.co/ice-plans-central-

April 19, 2025
sc68cal shared a status by Tattie
avatar
Tattie
Tattie@eldritch.cafe

Which one of you Fedi weirdos* was at the Edinburgh trans rights demo holding the sign saying:

private String gender
not
public const bool gender

* affectionate

April 19, 2025
sc68cal shared a status by randahl
avatar
Randahl Fink
randahl@mastodon.social

Whistleblower reveals evidence on how Elon Musk's DOGE team extracted 10 GB of sensitive data about American citizens from a government agency, and then deleted accounts and logs to cover their tracks.

Then, when the whistleblower tried to report the data breach, he received a threatening letter containing pictures taken from a drone watching him walking his dog.

npr.org/2025/04/15/nx-s1-53558

April 16, 2025
avatar
Sean M. Collins
sc68cal@jawns.club
Politics

Chris Van Hollen going to El Salvador is exactly what I wanted to see from the Democrats. Well done.

April 16, 2025
sc68cal shared a status by briankrebs
avatar
BrianKrebs
briankrebs@infosec.exchange

Must-read report from NPR, showing once again that DOGE is a massive threat to the cyber/national security of the United States:

"In the first days of March, a team of advisers from President Trump's new Department of Government Efficiency initiative arrived at the Southeast Washington, D.C., headquarters of the National Labor Relations Board.

The small, independent federal agency investigates and adjudicates complaints about unfair labor practices. It stores reams of potentially sensitive data, from confidential information about employees who want to form unions to proprietary business information.

The DOGE employees, who are effectively led by White House adviser and billionaire tech CEO Elon Musk, appeared to have their sights set on accessing the NLRB's internal systems. They've said their unit's overall mission is to review agency data for compliance with the new administration's policies and to cut costs and maximize efficiency."

"But according to an official whistleblower disclosure shared with Congress and other federal overseers that was obtained by NPR, subsequent interviews with the whistleblower and records of internal communications, technical staff members were alarmed about what DOGE engineers did when they were granted access, particularly when those staffers noticed a spike in data leaving the agency. It's possible that the data included sensitive information on unions, ongoing legal cases and corporate secrets — data that four labor law experts tell NPR should almost never leave the NLRB and that has nothing to do with making the government more efficient or cutting spending."

"Meanwhile, according to the disclosure and records of internal communications, members of the DOGE team asked that their activities not be logged on the system and then appeared to try to cover their tracks behind them, turning off monitoring tools and manually deleting records of their access — evasive behavior that several cybersecurity experts interviewed by NPR compared to what criminal or state-sponsored hackers might do."

"The employees grew concerned that the NLRB's confidential data could be exposed, particularly after they started detecting suspicious log-in attempts from an IP address in Russia, according to the disclosure. Eventually, the disclosure continued, the IT department launched a formal review of what it deemed a serious, ongoing security breach or potentially illegal removal of personally identifiable information. The whistleblower believes that the suspicious activity warrants further investigation by agencies with more resources, like the Cybersecurity and Infrastructure Security Agency or the FBI."

npr.org/2025/04/15/nx-s1-53558

April 15, 2025